[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Grover et al., 2021 - Google Patents

A Review on Block chain and Data Mining Based Data Security Methods

Grover et al., 2021

Document ID
13599020712776884659
Author
Grover P
Prasad S
Publication year
Publication venue
2021 2nd International Conference on Big Data Analytics and Practices (IBDAP)

External Links

Snippet

In the 21st century, we are at the verge where emerging technologies are growing at the fast pace and it is important to seek existing researches related to application of block chain technology and It is significant to distinguish the current explores explicitly identified with the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Salem et al. Introduction to the data mining techniques in cybersecurity
Grover et al. A Review on Block chain and Data Mining Based Data Security Methods
Datta et al. Real-time threat detection in ueba using unsupervised learning algorithms
Onyema et al. Cyber threats, attack strategy, and ethical hacking in telecommunications systems
Kshetri et al. cryptoRAN: A review on cryptojacking and ransomware attacks wrt banking industry-threats, challenges, & problems
Younus et al. A Survey on Network Security Monitoring: Tools and Functionalities
Jain et al. A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment
Kebande A novel cloud forensic readiness service model
Naoum et al. An enhancement of the replacement steady state genetic algorithm for intrusion detection
Aswathy et al. Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future
Parameswarappa et al. A Machine Learning-Based Approach for Anomaly Detection for Secure Cloud Computing Environments
Jeslin et al. Securing Smart Networks and Privacy Intrusion Detection System Utilizing Blockchain and Machine Learning
Kishore et al. Intrusion Detection System a Need
Kant How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning
Khan et al. AI-Powered Detection and Mitigation of Backdoor Attacks on Databases Server
Kazaure et al. Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review.
Guelzim et al. Formal methods of attack modeling and detection
Kumar et al. Prediction of Probability of Server Intrusion Using Machine Learning Techniques
Babič et al. A new systemic taxonomy of cyber criminal activity
Pierrot et al. Hybrid intrusion detection in information systems
Makka et al. A Structured Investigation of Network Security Strategies and its Applications
Shetty Vulnerability Assessment for Cybersecurity using Machine learning
Priyalakshmi et al. Intrusion Detection Using Enhanced Transductive Support Vector Machine
Aloffi Real time network security intrusions and risk management: a survey
Giri et al. Intrusion Detection System for Local Networks–A Review Study